Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 156 (0.036 secs)
You searched for: subject:"cryptography"
[1] 2 3 4     Next    Last
[texts]Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes - Simonetta, Francesco, 1410-1480
Book from Project Gutenberg: Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes Library of Congress Classification: Z
Keywords: Cryptography
Downloads: 180
[audio]Unreleased Tracks - Ulan Batur
Tracks only released on the Toldstøj cassette and here.
Keywords: Cryptography
Downloads: 2
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI. Jahrhunderts - Meister, Aloys, 1866-1925

Keywords: Cryptography
Downloads: 43
[texts]Cryptography .. - Langie, André, b. 1871-
Bibliography: p. 158. Subtitle on cover [Cryptography ... a study on secret writings]
Keywords: Cryptography
Downloads: 1,953 4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars(1 review)
[texts]Cryptography - Langie, Andr b. 1871-
Bibliography: p. 158
Keywords: Cryptography
Downloads: 3,499
[texts]Cryptography : or, The history, principles, and practice of cipher-writing - Hulme, F. Edward (Frederick Edward), 1841-1909
26
Keywords: Cryptography
Downloads: 1,871
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI jahrhunderts - Meister, Aloys, 1866- [from old catalog]
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Keywords: Cryptography
Downloads: 1,530
[texts]Cryptomenysis patefacta; or, The art of secret information disclosed without a key. Containing, plain and demonstrative rules, for decyphering all manner of secret writing. With exact methods, for resolving secret intimations by signs or gestures, or in speech. As also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c - Falconer, John, decipherer
Gibson 387
Keywords: Cryptography
Downloads: 736
[texts]Cryptography : or the history, principles and practice of cipher- writing - Hulme, F. Edward (Frederick Edward), 1841-1909
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Cryptography; Ciphers
Downloads: 435
[texts]A treatise on the art of decyphering, and of writing in cypher. With an harmonic alphabet - Thicknesse, Philip, 1719-1792
Book digitized by Google from the library of the University of Michigan and uploaded to the Internet Archive by user tpb.
Keywords: Ciphers; Cryptography
Downloads: 291
[texts]Shorthand, cryptography, etc.; catalogue of books on shorthand, cryptography, etc. in the library of Robert Todd, esq., Hadley Green, Barnet - Todd, Robert
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Shorthand; Cryptography
Downloads: 1,839
[texts]Manual for the solution of military ciphers - Hitt, Parker, b. 1878

Keywords: Ciphers; Cryptography
Downloads: 1,716
[texts]Chaotic keystream generators for additive stream ciphers - Leader, Jeffery J.
Technical report for period January 1993 - April 1993.
Keywords: CRYPTOGRAPHY; SECURE COMMUNICATIONS
Downloads: 63
[texts]Simon Singh The Code Book ( Teenage Version)
Simon Singh is a popular author and the famous author of the book Fermat's Last Theorem. This is a book he has written on cryptography and makes for a very interesting read.
Keywords: Simon; Singh; Code; Cryptography
Downloads: 20
[audio]Crypto recipes for your data diet - Pieter Rogaar
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; cryptography
Downloads: 12
[texts]The Cryptomenytics and Cryptography of Gustavus Selenus in Nine Books - Gustavus Selenus
Draft of an English translation of the Latin work by Gustavus Selenus (the psuedonym of Augustus, duke of Braunschweig-Lüneburg) written in 1624, translated by John William Henry Walden around 1900. This draft was meant to be published, but it never was. It is currently part of the Fabyan Collection of the rare books collections at the Library of Congress, call number Z103.A95 1900. This file is a scan of a photocopy of the manuscript...
Keywords: cryptography; medieval; translations
Downloads: 703
[texts]Mercury, or, The secret and swift messenger : Shewing, how a man may with privacy and speed communicate his thoughts to a friend at any distance - Wilkins, John, 1614-1672
Held by Gallaudet University Library Deaf Collections and Archives, Washington, D.C. (catalog link: http://catalog.wrlc.org/cgi-bin/Pwebrecon.cgi?BBID=1383691)
Keywords: Cryptography; Gesture; Sign language
Downloads: 343
[texts]Steganographia BSB 1608 - Trithemius, Johannes, 1462-1516
Scans from die Bayerische Staatsbibliothek via Google. This is Trithemius's most famous work, written c. 1499; published Frankfurt, 1606., was placed on the Index Librorum Prohibitorum in 1609 and removed in 1900. This book is in three volumes, and appears to be about magicâspecifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganog...
Keywords: occult; demonology; steganography; cryptography
Downloads: 653
[texts]Mathematical recreations and essays - Ball, W. W. Rouse (Walter William Rouse), 1850-1925
Arithmetical recreations.--Geometrical recreations.--Mechanical recreations.--Chessboard recreations.--Magic squares.--Unicursal problems.--Kirkman's school-girls problem.--Miscellaneous problems.--The mathematical tripos.--Three classical geometrical problems.--The parallel postulate.--Insolubility of the algebraic quintic.--Mersenne's numbers.--String figures.--Astrology.--Cryptographs and ciphers.--Hyper-space.--Time and its measurement.--Matter and ether theories
Keywords: Geometry; Cryptography; Ciphers
Downloads: 2,218
[texts]An Overview and Analysis of Private and Public Key DNA Cryptography - K.Sireesha ,V.Srujana
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography
Keywords: Cryptography; SK; AK; PKC; DES; DNA based Cryptography
Downloads: 12
[texts]Combined Implementation of Robust Cryptosystem for Non-invertible Matrices based on Hill Cipher and Steganography
In this paper, we have combined the RobustCryptosystem for Non-invertible matrices based on Hill Ciphertechnique with steganography method in order to securelytransmit text message. The steganography method used is LSBinsertion technique. The encryption and steganographymethods are used subsequently along with two randomizationtechnique: one of XOR the encrypted text and another ofrandomized LSB insertion in any cover image...
Keywords: cryptography; steganography; plaintext; stegoobject; cipher
Downloads: 4
[audio]Samuel-Braunstein-teleportation-part1 - Ian Woolf
Dr Samuel Braunstein about quantum teleportation, why there can never be two Captain Kirks, and how to teleport by fax and truck. Dr Braunstein is professor of informatics at the University of Wales in Bangor, England. THis is part 1 of a two part interview
Keywords: science; teleport; quantum; entanglement; cryptography
Downloads: 380
[movies]CLUG Talk - 27 May 2008 - OpenSSL and Certificates - Stefano Rivera
CLUG Talk: OpenSSL and Certificates Speaker: Stefano Rivera Slides: available here More CLUG Talks
Keywords: CLUG; SSL; OpenSSL; PKI; Cryptography
Downloads: 167
[audio]AntiCryptography - Joel Anderson
How do we communicate with aliens? How do we send them messages that they can understand?
Keywords: SETI; Aliens; cryptography; cryptograms; puzzles
Downloads: 113
[texts]Maguire's code of ciphers [microform] : a comprehensive system of cryptography designed for general use and arranged in conformity with the rules and regulations adopted by the International Convention of Telegraph Companies, respecting "secret language telegrams" - Maguire, Charles H. J. (Charles Henry Joseph)
Filmed from a copy of the original publication held by the D.B. Weldon Library, University of Western Ontario
Keywords: Cryptography; Ciphers; Cryptograhie; Chiffres (Cryptographie)
Downloads: 1,556
[texts]Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes - Currie, Daniel L.;Campbell, Hannelore.
Thesis advisor(s): Cynthia E. Irvine, Harold Fredricksen
Keywords: Cryptography; Data compression (Computer science)
Downloads: 182
[texts]Speculum imaginum veritatis occultæ : exhibens symbola, emblemata, hieroglyphica, ænigmata, omnitam materiæ, quam formæ varietate; exemplis simul, ac præceptis illustratum - Masen, Jakob, 1606-1681
Signatures: A * 2* 3* 4*⁴ ²A B-4A a-d e⁴
Keywords: Signs and symbols; Cryptography; Emblems
Downloads: 428
[texts]Principles of Applied Mathematics - Lempel-Ziv Notes - Daniel Kleitman;Peter Shor
We now explain the algorithm that Lempel and Ziv gave in a 1978 paper, and generally called LZ78. This is opposed to LZ77, an earlier algorithm which di_ered signi�cantly in the implementation details but is based on the same general idea. This idea is that if some text is not random, a substring that you see once is more likely to appear again than substrings you haven�t seen.
Keywords: Maths; Algebra; Coding and Cryptography; Codes; Mathematics
Downloads: 4
[audio]Samuel-Braunstein-teleportation-part2 - Ian Woolf
Continuing my discussion with Dr Samuel Brainstein about Quantum teleportation, entanglement, encryption, eavesdropping, and true love. Dr Braunstein is Professor of Informatics at the University of Wales in Bangor, England. This is part two of a two part interview
Keywords: science; teleport; quantum; braunstein; cryptography; encrypt; entanglement
Downloads: 397
[texts]54
Extensive use of Wireless Sensor Networks is givingrise to different types of threats in certain commercial andmilitary applications. To protect the WSN data communicationagainst various threats appropriate security schemes areneeded. However, WSN nodes are resource constrained, withrespect to limited battery energy, and limited computationaland memory available with each WSN node. Hence, thesecurity model to be used in WSN’s should use minimalresources to the extent possible and it should als...
Keywords: WSN; Cryptography; ECC; Koblitz’s encoding
Downloads: 6
[texts]A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
Downloads: 157
[texts]Fish and I - W.T. Tutte

Keywords: Maths; Algebra; Coding and Cryptography; Mathematics
Downloads: 4
[audio]Martin Hellman at Deusto University
Charla de Martin Hellman en la Universidad de Deusto sobre criptografía. Martin Hellman's talk about cryptography at University of Deusto.
Keywords: Martin Hellman, Deusto, university, cryptography, PKI
Downloads: 178
[texts]A Secured Approach to Visual Cryptographic Biometric Template
BIOMETRIC authentication systems are gainingwide-spread popularity in recent years due to the advances insensor technologies as well as improvements in the matchingalgorithms. Most biometric systems assume that the templatein the system is secure due to human supervision (e.g.,immigration checks and criminal database search) or physicalprotection (e.g., laptop locks and door locks). Preserving theprivacy of digital biometric data (e.g., face images) stored in acentral database has become of para...
Keywords: Visual cryptography; Image scrambling; Random permutation
Downloads: 7
[movies]Eben Moglen + Bruce Schneier - Internet Society New York Chapter
Bruce Schneier in conversation with Eben Moglen at Columbia Law School on December 12 2013.
Keywords: NSA; surveillance; Snowden; security; privacy; cryptography; Internet
Downloads: 1,691
[texts]A graphic user interface for rapid integration of steganography software - Wootten, David Raiman.
"March 1996."
Keywords: Cryptography; Graphical user interfaces (Computer systems)
Downloads: 164
[movies]Arsdigita University Course 2: Discrete Mathematics - Lecture 20
Lecture on discrete mathematics, given on November 28, 2000. Topics covered: cryptography Lecturer: Shai Simonson
Keywords: arsdigita; computer science; discrete math; cryptography
Downloads: 385
[texts]The mathematical and philosophical works of the Right Reverend John Wilkins ... to which is prefix'd the author's life, and an account of his works - Wilkins, John, 1614-1672
Various paging
Keywords: Science; Plurality of worlds; Mechanics; Cryptography
Downloads: 543
[texts]Needles and haystacks: the search for Ultra in the 1930's - GouazeΓ, Linda Yolande.
Thesis advisors, David Canright, Carlos F. Borges
Keywords: Intelligence service; History; Cryptography; History; Ciphers; History
Downloads: 142
[texts]500 YEARS OF ROMANIAN CRYPTOGRAPHY - Dan Toma Dulciu
This is the story of the Romanian Cryptography, from the beginning till now.
Keywords: cryptography; romania; Evstatie; the protopsalt of Putna
Downloads: 116
[texts]3. A Behaviour Of RSA.full
RSA cryptographic algorithm used to encrypt and decrypt the messages for the citation of message in user’s Communication over the secure transmission channel like internet. it will also throw some light on the flaws of some otherpublic key cryptographic algorithms in comparison to RSA algorithm. RSA algorithm will be used to generate key pairs (private key and public key), which are generated using 19 digit prime value, which will be used to encrypt and decrypt the messages...
Keywords: Cryptography; RSA; Big Integer; Secure Communication Channel
Downloads: 9
[movies]Ben Martin - Cryptography
Ben Martin could teach the da Vinci coders a thing or two. He's interested In cryptography, the study of secret codes. In this video he tells us a little bit about its history (the Romans were into it way back in Julius Caesar's day). Ben also talks about the everyday uses for cryptography, including cash machines and online Internet transactions with credt cards.
Keywords: Mathematics; University of Auckland; Mathsreach; Cryptography
Downloads: 262
[texts]Mathematical recreations and essays - Ball, W. W. Rouse (Walter William Rouse), 1850-1925

Keywords: Mathematical recreations; Geometry -- Problems, Famous; Cryptography; Ciphers
Downloads: 1,961
[texts]A Study: Cryptology Techniques and Methodologies - Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in itsaspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts todefine the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte tobyte and complex encryption is shown as a study of cryptosystem classes that were used to overcome ...
Keywords: Information Security; Cryptosystems; Network Security; Cryptoanalysis; Cryptography
Downloads: 4
[texts]An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review
This paper introduces the idea of hierarchical visualcryptography. Authentication is the important issue over theinternet. This paper describes a secured authenticationmechanism with the help of visual cryptography. Visualcryptography simply divides secret information in to numberof parts called shares. These shares are further transmittedover the network and at the receiving end secrets are revealedby superimposition...
Keywords: Visual cryptography; secret sharing; shares; authentication
Downloads: 6
[texts]Number Theory Algorithms - Raman V
Primality Testing, Integer Factorization, Discrete Logarithms
Keywords: prime numbers; prime factorization; discrete logarithm; cryptography
Downloads: 453
[texts]Secure and Efficient Cluster Selection Mechanism Using Wimax - Vinni Kaur, Amanpreet Kaur, Arvind Pathak
WiMAX technology is a telecommunications technology that offers transmission of wireless data via a number of transmission methods; such as portable or fully mobile internet access via point to multipoint links. As the size of a Wireless Network is much vast because of this the network containing number of base station and mobile station is divided in terms of clusters. Each cluster having a cluster head or the base station the controls all nodes of the network...
Keywords: WiMAX; Handoff; Packets; cryptography; secure and efficient
Downloads: 56
[texts]HACBPS: A Hierarchical Access Control- Based Proxy Signature
In this paper, we propose a new security  protocol which is styled hierarchical access control-based proxy signature (HACBPS).In hierarchical access control, upper security level users can access some secret information hold by lower security level users, but reverse is not allowed. Whereas in proxy signature, on behalf of the original signer, proxy signer can generate the signature on an arbitrary message...
Keywords: cryptography; security; access control; proxy signature; Poset
Downloads: 28
[texts]Chinese Language Seed And Its Applications - Kok-Wah Lee @ XpreeLi
First Edition (version 1.1) publicly archived online on 10 April 2010 This copyright protected patent-like article is conceptualized, prepared, and written by Kok-Wah Lee @ Xpree Li on the creation of Chinese language seeds and their usages for various applications, like computer-free cryptography, Chinese polyalphabetic cryptography, and Chinese input method into the computer system. Due to the relatively high research costs invested by the author, for refund, as well as for building up a fund ...
Keywords: Chinese language seed; computer-free cryptography; Chinese polyalphabetic cryptography; Chinese input method
Downloads: 344
[texts]The "Colorado" code. - United States.; Army.; American Expeditionary Forces
47 p. ; 20 cm.
Keywords: Ciphers -- Handbooks, manuals, etc. Cryptography -- United States. World War, 1914-1918 -- Cryptography
Downloads: 1,448
[1] 2 3 4     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
audio
movies